Skip to content

Commit 1587e83

Browse files
committed
Sync web site with Quarkus documentation
1 parent c6e64aa commit 1587e83

File tree

6 files changed

+8
-13
lines changed

6 files changed

+8
-13
lines changed

_guides/_attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Common attributes.
22
// --> No blank lines (it ends the document header)
33
:project-name: Quarkus
4-
:quarkus-version: 3.26.3
4+
:quarkus-version: 3.26.4
55
:quarkus-platform-groupid: io.quarkus.platform
66
// .
77
:maven-version: 3.9.9

_guides/rest-client.adoc

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1861,8 +1861,6 @@ To enable logging, add the `quarkus.rest-client.logging.scope` property to your
18611861

18621862
As HTTP messages can have large bodies, we limit the amount of body characters logged. The default limit is `100`, you can change it by specifying `quarkus.rest-client.logging.body-limit`.
18631863

1864-
NOTE: REST Client is logging the traffic with level DEBUG and does not alter logger properties. You may need to adjust your logger configuration to use this feature.
1865-
18661864
These configuration properties work globally for all clients injected by CDI.
18671865
If you want configure logging for a specific declarative client, you should do it by specifying named "client" properties, also known as `quarkus.rest-client."client".logging.*` properties.
18681866

@@ -1874,9 +1872,6 @@ quarkus.rest-client.logging.scope=request-response
18741872
quarkus.rest-client.logging.body-limit=50
18751873
18761874
quarkus.rest-client.extensions-api.scope=all
1877-
1878-
quarkus.log.category."org.jboss.resteasy.reactive.client.logging".level=DEBUG
1879-
quarkus.log.console.level=DEBUG
18801875
----
18811876

18821877
[TIP]

_guides/security-oidc-bearer-token-authentication.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -603,7 +603,7 @@ testImplementation("io.quarkus:quarkus-junit5")
603603

604604
The preferred approach for integration testing against Keycloak is xref:security-openid-connect-dev-services.adoc[Dev Services for Keycloak].
605605
`Dev Services for Keycloak` will start and initialize a test container.
606-
Then, it will create a `quarkus` realm and a `quarkus-app` client (`secret` secret) and add `alice` (`admin` and `user` roles) and `bob` (`user` role) users, where all of these properties can be customized.
606+
Then, it will create a `quarkus` realm and a `quarkus-app` client with `secret` as the client secret. It will also add two users: `alice` with both `admin` and `user` roles, and `bob` with the `user` role. All of these properties can be customized.
607607

608608
First, add the following dependency, which provides a utility class `io.quarkus.test.keycloak.client.KeycloakTestClient` that you can use in tests for acquiring the access tokens:
609609

@@ -626,7 +626,7 @@ testImplementation("io.quarkus:quarkus-test-keycloak-server")
626626
Next, prepare your `application.properties` configuration file.
627627
You can start with an empty `application.properties` file because `Dev Services for Keycloak` registers `quarkus.oidc.auth-server-url` and points it to the running test container, `quarkus.oidc.client-id=quarkus-app`, and `quarkus.oidc.credentials.secret=secret`.
628628

629-
However, if you have already configured the required `quarkus-oidc` properties, then you only need to associate `quarkus.oidc.auth-server-url` with the `prod` profile for `Dev Services for Keycloak`to start a container, as shown in the following example:
629+
However, if you have already configured the required `quarkus-oidc` properties, then you only need to associate `quarkus.oidc.auth-server-url` with the `prod` profile for `Dev Services for Keycloak` to start a container, as shown in the following example:
630630

631631
[source,properties]
632632
----

_guides/security-openid-connect-providers.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The configuration of such providers can become complex, very technical and diffi
2525

2626
`quarkus.oidc.provider` configuration property has been introduced to refer to well-known OpenID Connect and OAuth2 providers. This property can be used to refer to a provider such as `github` with only a minimum number of customizations required, typically, an account specific `client id`, `client secret` and some properties have to be set to complete the configuration.
2727

28-
This property can be used in `application.properties`, in xref:security-openid-connect-multitenancy.adoc[multi-tenant] set-ups if more than one provider has to be configured (for example, see https://docs.quarkiverse.io/quarkus-renarde/dev/security.html#_using_oidc_for_login[Quarkus Renarde security documentation]), in custom xref:security-openid-connect-multitenancy.adoc#tenant-config-resolver[TenantConfigResolvers] if the tenant configurations are created dynamically.
28+
This property can be used in `application.properties` and in custom xref:security-openid-connect-multitenancy.adoc#tenant-config-resolver[TenantConfigResolvers] if the tenant configurations are created dynamically.
2929

3030
== Well Known Providers
3131

_guides/upx.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ If you want to force compression to take place in a container, you can set `quar
3838
If you are not in one of these cases, the compression fails.
3939

4040
Setting `quarkus.native.compression.container-image` results in the compression to run in a container.
41-
If you want to set the variable, but not run the compression in a container, set `quakrus.native.compression.container-build` explicitly to `false`.
41+
If you want to set the variable, but not run the compression in a container, set `quarkus.native.compression.container-build` explicitly to `false`.
4242

4343
[IMPORTANT]
4444
.`WORKDIR` for the image used for compression

_guides/web.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,9 @@ Here is a simple example of a Qute template:
8383

8484
=== Model-View-Controller (MVC)
8585

86-
The MVC approach is also made very easy with Quarkus thanks to https://docs.quarkiverse.io/quarkus-renarde/dev/index.html[the Renarde extension], a Rails-like framework using Qute.
86+
The MVC approach is also made very easy with Quarkus thanks to Qute.
8787

88-
Associated with the https://docs.quarkiverse.io/quarkus-web-bundler/dev/[Web Bundler extension], the road is open to build modern web applications for all your needs. Here is what a simple Renarde controller looks like:
88+
Associated with the https://docs.quarkiverse.io/quarkus-web-bundler/dev/[Web Bundler extension], the road is open to build modern web applications for all your needs.
8989

9090
.src/main/java/rest/Todos.java
9191
[source,java]
@@ -155,7 +155,7 @@ public class Todos extends Controller {
155155
}
156156
----
157157

158-
NOTE: Check out https://www.youtube.com/watch?v=JNmHNSmK180[Quarkus Insights Episode #178]. First part is a hands-on demonstration of creating a CMS with Renarde. You can also give it a try using https://github.com/quarkusio/quarkus-web-lab[the web-lab repo]).
158+
NOTE: Check out https://www.youtube.com/watch?v=JNmHN5mK180[Quarkus Insights Episode #178]. You can also give it a try using https://github.com/quarkusio/quarkus-web-lab[the web-lab repo].
159159

160160
== Single Page Applications
161161

0 commit comments

Comments
 (0)